A Guide to Successfully Implementing the NIST Cybersecurity Framework

"Despite a growing focus on defensive efforts, the number of successful cybersecurity breaches continues to rise. To address the growing threat, in 2013 an Executive Order (EO) was issued that provided a mandate to establish a voluntary common framework for cybersecurity defense.

As a result, the National Institute of Standards and Technology (NIST) was tasked with development of a common framework to strengthen cybersecurity defenses across critical infrastructure in all industries and organizations. This is more commonly known as the Cybersecurity Framework (CF). The NIST CF consists of standards, guidelines, and practices to promote the protection of critical infrastructure.

This white paper provides background information on the CF guidance and explains how organizations should use the framework to better manage and reduce cybersecurity risk."

Spotlight

Changyou.com (China)

"Changyou.com (NASDAQ: CYOU) is a leading developer and operator of online games in China. We began operations as a business unit within Sohu.com Inc. (NASDAQ: SOHU) in 2003, before our carve-out as a separate, stand-alone company in December 2007 and subsequent listing on the NASDAQ Global Select Market in April 2009. We now operate one of the most popular MMOGs in China, two popular web games in China and have enjoyed strong growth in user data and revenues for our games. Changyou also owns and operates the 17173.com Website, a leading game information portal in China. We have a leading in-house technology platform that includes our advanced 2.5D and 3D graphics engine, a uniform game development platform, effective anti-cheating and anti-hacking technologies, proprietary cross-networking technology and advanced data protection technology. Our product development team and game operations team work closely together to translate game player feedback into game updates and expansion pa

OTHER WHITEPAPERS
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More
news image

HackerPowered Security Report 2022 By HackerOne

whitePaper | March 14, 2023

Security automation cannot replace the creativity of humans. In fact, 92% of ethical hackers say they can find vulnerabilities scanners can’t. For the past six years, we’ve been surveying hackers to learn more about how they see the evolving security testing industry. We combine these insights with the world’s largest dataset of vulnerabilities to identify trends that inform our customers how to build an impactful security strategy.

Read More
news image

Securing Today's Convenience Stores with Fortinet

whitePaper | June 14, 2023

Today’s convenience stores (C-Stores) rely on a variety of digital tools to support an evolving retail engagement model that includes everything within the store interior and the forecourt. This can involve point-of-sale (POS) infrastructure, self-service kiosks, intelligent building systems, digital signage, fuel dispensers, guest Wi-Fi, security cameras, loyalty system integration, and store-in-store services. Plus, today’s stores contain a wide array of Internet-of-Things (IoT) devices, such as walk-in cooler sensors and occupancy sensors. Protecting these critical systems against cyberthreats is paramount for compliance and maintenaning brand value.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More

Spotlight

Changyou.com (China)

"Changyou.com (NASDAQ: CYOU) is a leading developer and operator of online games in China. We began operations as a business unit within Sohu.com Inc. (NASDAQ: SOHU) in 2003, before our carve-out as a separate, stand-alone company in December 2007 and subsequent listing on the NASDAQ Global Select Market in April 2009. We now operate one of the most popular MMOGs in China, two popular web games in China and have enjoyed strong growth in user data and revenues for our games. Changyou also owns and operates the 17173.com Website, a leading game information portal in China. We have a leading in-house technology platform that includes our advanced 2.5D and 3D graphics engine, a uniform game development platform, effective anti-cheating and anti-hacking technologies, proprietary cross-networking technology and advanced data protection technology. Our product development team and game operations team work closely together to translate game player feedback into game updates and expansion pa

Events